Review Questions Ch.10

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following can hide internal IP addresses from the Internet? (Choose all that apply.) a. packet filters b. NAT c. proxy servers d. state tables

b. NAT c. proxy servers

What is the main problem with using a screening router? a. The router can be configured incorrectly. b. The router might not provide an adequate screen. c. The router cannot be used with a firewall. d. The router alone cannot stop many types of attacks.

d. The router alone cannot stop many types of attacks.

A screening router would be an appropriate choice for meeting the security needs of a _____. a. small office network b. home network c. DMZ d. none of the above

d. none of the above.

A bastion host is usually located on the internal network. True or False?

False

In a Cisco ASA 5505 firewall, security level 100 is the least secure level. True or False?

False

To isolate all external Web requests to a specific Web server on the DMZ, it would be best to use many-to-one NAT. True or False?

False

A DMZ is _____. a. a trusted network b. a semitrusted network c. an untrusted network d. not actually a network

b. a semitrusted network

What enables servers in a server farm to work together to handle requests? a. a router b. a switch c. a networking hub d. load-balancing software

d. load-balancing software

Which of the following functions can a bastion host perform? (Choose all that apply.) a. FTP server b. e-mail server c. security management server d. domain controller

a. FTP server b. e-mail server

A corporation with several branch offices has decided to maintain multiple firewalls, one to protect each branch office's network. What is the most efficient way to maintain these firewalls? a. Use a centralized security workstation. b. Send information about the security policy to each network administrator. c. Set up remote desktop management software. d. Broadcast configuration instructions periodically by e-mail.

a. Use a centralized security workstation.

Hardening a bastion host involves which of the following measures? (Choose all that apply.) a. disabling unnecessary services b. removing unnecessary accounts c. installing current patches d. all of the above

a. disabling unnecessary services b. removing unnecessary accounts c. installing current patches d. all of the above

Which of the following computers is likely to be found in a DMZ? (Choose all that apply.) a. e-mail server b. domain controller c. Web server d. customer information database

a. e-mail server c. Web server

Which of the following issues should you consider in firewall design? (Choose all that apply.) a. fault tolerance b. log size c. authorization d. load balancing

a. fault tolerance d. load balancing

A proxy server _____ . (Choose all that apply.) a. is designed to improve Web access b. is the same as a reverse firewall c. uses fewer system resources than a software firewall d. can filter Application layer content

a. is designed to improve Web access d. can filter Application layer content

For which of the following reasons would you consider creating a protected subnet within an already protected internal network? (Choose all that apply.) a. to protect customer information b. to protect management servers c. to protect the company's reputation d. to protect Web servers

a. to protect customer information b. to protect management servers d. to protect Web servers


Conjuntos de estudio relacionados

Chapter 4: Taxes, Retirement, and Other Insurance Concepts

View Set

All possible medications for maternity 3 exam

View Set

Ch 2 Workforce Safety and Wellness Post Test EMT

View Set

Chapter 5: Understanding Consumer and Business Buyer Behavior

View Set

Network Security Final (Version 1.0)

View Set

COPY OF FOUND- HESI PREP QUESTIONS

View Set

Biology Ch. 42 Transport Cardiovas (MB)

View Set